1: Download & run Unhidehttp://www.bleepingcomputer.com/for...http://download.bleepingcomputer.co...Once the program has been downloaded, double-click on the Unhide.exe icon on your desktop and allow the program to run, it does take some time, be patient. This program will remove the +H, or hidden, attribute from all the files on your hard drives. If there are any files that were purposely hidden by you, you will need to hide them again after this tool is run.

2: Reboot

3: Run ESET & post the log please. This scan may take a very long while, so please be patient. Start it before going to work or bed.http://www.eset.com/us/online-scann...http://www.eset.com/home/products/o...Configure ESET this way & disable your AV.http://i.imgur.com/3U7YC.gifHow to Temporarily Disable your Anti-virushttp://www.bleepingcomputer.com/for...Why Would I Ever Need an Online Virus Scanner?I already have an antivirus program installed, isn't that enough?http://www.squidoo.com/the-best-fre...Once onto a machine, malware can disable antivirus programs, prevent antimalware programs from downloading updates, or prevent a user from running antivirus scans or installing new antivirus software or malware removal tools. At this point even though you are aware the computer is infected, removal is very difficult.5: Why does the ESET Online Scanner run slowly on my computer?If you have other antivirus, antispyware or anti-malware programs running on your computer, they may intercept the scan being performed by the ESET Online Scanner and hinder performance. You may wish to disable the real-time protection components of your other security software before running the ESET Online Scanner. Remember to turn them back on after you are finished.17: How can I view the log file from ESET Online Scanner?http://kb.eset.com/esetkb/index?pag...http://www.eset.com/home/products/o...The ESET Online Scanner saves a log file after running, which can be examined or sent in to ESET for further analysis. The path to the log file is "C:\Program Files\EsetOnlineScanner\log.txt". You can view this file by navigating to the directory and double-clicking on it in Windows Explorer, or by copying and pasting the path specification above (including the quotation marks) into the Start ? Run dialog box from the Start Menu on the desktop.

"I followed you instructions Johnw. Here is the Eset Log:"Thanks spears.

Please copy & paste instructions into a text file, print steps & info. You will need them, as they are hard to remember, for when you are offline.

Note: Is your important stuff backed up, including your emails & address book? Anything can happen, during the clean up.

The badies are always ahead of the goodies, be aware, this can be a very long process, involving many different tools to clean up an infected comp.Some infections are irremovable.Very Important: Malware infections can possibly lead to identity theft, stolen bank funds, misuse of credit card information etc.The use of the computer is the primary factor in the decision whether to re-format and re-install, or just disinfect.http://www.dslreports.com/faq/10063How to report ID theft, fraud, drive-by installs, hijacking and malware?http://www.dslreports.com/faq/10451Change your router password if it is not strong or still uses the default one.Hack lets intruders sneak into home routershttp://tinyurl.com/4pz64fchttp://compnetworking.about.com/od/...

As we dismantle the infection bit by bit, that may allow the repeat use of programs, which may in turn pick up more.Removal of infected parts of the system, may cause other parts to stop working, such as your Internet connection or Services. These then we have to repair.

Thanks Johnw. Did you discover anything from the Eset Log? I thought I should say before starting your process that my PC/internet works fine and always has. The only item I am aware of is the one Malwarebytes couldn't remove which is according to them PUM potentially unwanted software.

The information on Computing.Net is the opinions of its users. Such
opinions may not be accurate and they are to be used at your own risk.
Computing.Net cannot verify the validity of the statements made on this
site. Computing.Net and Purch hereby disclaim all responsibility
and liability for the content of Computing.Net and its accuracy.